Search

Your search keyword '"Shaharyar"' showing total 91 results

Search Constraints

Start Over You searched for: Author "Shaharyar" Remove constraint Author: "Shaharyar" Topic computer science Remove constraint Topic: computer science
91 results on '"Shaharyar"'

Search Results

1. Cybersafety: A System-Theoretic Approach to Identify Cyber-Vulnerabilities & Mitigation Requirements in Industrial Control Systems

2. Performance of cache placement using supervised learning techniques in mobile edge networks

3. Appliance Scheduling Optimization in Smart Home Networks

5. An LSTM-Based Approach for Understanding Human Interactions Using Hybrid Feature Descriptors Over Depth Sensors

6. Performance Analysis of LSTMs for Daily Individual EV Charging Behavior Prediction

7. Smart Meter Data Obfuscation Using Correlated Noise

9. A Comparative Analysis of Various Controller Techniques for Optimal Control of Smart Nano-Grid Using GA and PSO Algorithms

10. Identifying and Anticipating Cyberattacks That Could Cause Physical Damage to Industrial Control Systems

11. Nano-emulgel: Emerging as a Smarter Topical Lipidic Emulsion-based Nanocarrier for Skin Healthcare Applications

12. Improved DInSAR time‐series reconstruction in the presence of phase unwrapping errors using Huber‐norm

13. RETRACTED: Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey

14. Safe Driving of Autonomous Vehicles through State Representation Learning

15. Performance of Learning Based Classification Techniques for Cache Placement in MENs

16. Affinity-Based Task Scheduling on Heterogeneous Multicore Systems Using CBS and QBICTM

17. Affinity Based Scheduling Using Bayesian Model and Load Balancing in Multicore Systems

18. Semantic similarity–based descriptive answer evaluation

19. Improved Dual Sinc Pulses to Reduce ICI Power and PAPR in OFDM-based Systems

20. Mobility-Aware Latency-Efficient Cache Placement in Mobile Edge Networks

21. Maximum Power Harvesting using Fuzzy Logic MPPT Controller

22. Modeling and Stability Enhancement of Wind Turbine using Linear Quadratic Regulator

23. Monitoring and Control of Reverse Feed Current in Grid Tied PV Systems Using Multiple MPPT Inverter

24. Policy-Gradient and Actor-Critic Based State Representation Learning for Safe Driving of Autonomous Vehicles

25. Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms

26. Short-term Individual Electric Vehicle Charging Behavior Prediction Using Long Short-term Memory Networks

27. ICI Reduction by Using the Improved Double-jump 1 Pulse in MQAM-OFDM Schemes

28. Depth Maps-Based Human Segmentation and Action Recognition Using Full-Body Plus Body Color Cues Via Recognizer Engine

29. Improved Nyquist-I Pulses to Enhance the Performance of OFDM-Based Systems

30. Cybersafety Analysis of Industrial Control Systems: Chiller Systems (Revised)

31. A Review on Video Analytics Its Challenges and Applications

32. Removal of Voltage Transients by PWM Switched Autotransformer & PI-Controller

33. Indoor Positioning and Tracking using Sensors of a Smart Device

34. BER Improvement Using the Better than Double-Jump 2 Pulse in OFDM Schemes Prone to Frequency Offset

35. Deep learning for object detection and scene perception in self-driving cars: Survey, challenges, and open issues

36. A service oriented IoT architecture for disaster preparedness and forecasting system

37. A Smart Surveillance System for People Counting and Tracking Using Particle Flow and Modified SOM

38. Boosted neural networks for improved short-term electric load forecasting

39. Robust human activity recognition from depth video using spatiotemporal multi-fused features

40. Depth Images-based Human Detection, Tracking and Activity Recognition Using Spatiotemporal Features and Modified HMM

41. Joint Admission Control, Mode Selection, and Power Allocation in D2D Communication Systems

42. Performance of Energy-Efficient Cooperative MAC Protocol with Power Backoff in MANETs

43. Improved Behavior Monitoring and Classification Using Cues Parameters Extraction from Camera Array Images

44. Identifying and Anticipating Cyber Attacks that could cause Physical Damage to Industrial Control Systems

45. A Review on Multisource Data Analysis using soft computing Techniques

46. Sparsity-driven coupled imaging and autofocusing for interferometric SAR

47. A subaperture based approach for SAR moving target imaging by low-rank and sparse decomposition

48. Detecting Complex 3D Human Motions with Body Model Low-Rank Representation for Real-Time Smart Activity Monitoring System

49. A comparative analysis of SIFT, SURF, KAZE, AKAZE, ORB, and BRISK

50. A Hybrid Feature Extraction Approach for Human Detection, Tracking and Activity Recognition Using Depth Sensors

Catalog

Books, media, physical & digital resources